FA
Today, Saturday، 18 May 2024 - 21:28
Mokhafaf

Acronym Finder

IPSec
What is IPSec ?
Internet Protocol Security
IPsec is a set of several protocols that to secure internet protocol communications by authentication and encryption per packet (packet) in a trajectory data goes to work. This protocol joint product of Microsoft and Cisco Systems, Inc., which in itself is interesting ....
MPLS
What is MPLS ?
Multi Protocol Label Switching
In the global network of computers and communication, telemarketing, switching labels (MPLS) is a mechanism to carry data is that some of the characteristics of the network, switching the Rotary on the network switch envelope competition. MPLS layer in OSI model acts that in general, the meanings of the traditional layer 2 (transport layer data) and Layer 3 (network layer) is considered, so often, to Layer 2 and 3, reference does, and some it layer 2/5 call. MPLS in order to provide the service carry data for the customer, the Rotary and the client, switching the envelope, which is a service model diagrams, it can produce was designed. It can carry various types of traffic includes packets, the IP well, Sonet, etc., ATM and Ethernet, use geared....
IS-IS
What is IS-IS ?
Intermediate Sysytem-Intermediate System
System to intermediate system Intermediate., the IS-is or iPhone SMS-iPhone SMS (IS-IS) mode, short phrase, Intermediate Sysytem-Intermediate System is a method designed to transfer useful data in a computer network, a group of computers connected together for physical and or similar devices.

This protocol by determining the best path for data transmission in a network of the type of switching pack, do it.The protocol in ISO/IEC 10589:2002 as an international standard on the reference model the OSI, or The Associated open systems was defined. Although it is originally an ISO standard. with this organization, the IETF defined the protocol as a standard internet released. IS-IS or system interfaces-system interfaces, as a de facto standard for backbone service providers Great be considered....
LT2P
What is LT2P ?
Layer Tunneling 2 Protocol
Tunneling Protocol layer 2 (Layer 2 Tunneling Protocol), or briefly LT2P, a tunneling protocol is in computer networks to support virtual private network (VPN) goes to work. In this way, no encryption or security is your protocol doesn't provide, but LT2p to create privacy relies on the protocol encryption inside the tunnel that passes through it.

although there is LT2P operates in Kurdish the same protocol layer in the OSI model. but in fact, a layer protocol of the meeting and from the port, UDP registered 1701 uses....
SCVP
What is SCVP ?
Server-based Certificate Validation Protocol
Protocol Validation Certificate-based server (briefly SCVP) is an internet protocol that is also the path between a digital certificate x.509, and a root trusted(their discovery of the track) determines the track and also credit the track due to the policy validation(representative, valid storage path) is specified is determined....
TLS
What is TLS ?
Transport Layer Security
Security protocol transport layer (TLS), etc. based on Secure Socket Layer(Secure Sockets Layer), which is one of the protocols, the encryption is built. This protocol for security data transmission on the internet for because working with database, web. email, and faxes and instant messaging, Internet goes to work. Although the TLS and SSL together, a few differences but the main part of this protocol, and over the same remaining....
WOL
What is WOL ?
Wake On Lan
Wake up from Lan (WOL) is a standard system network, which is let on or the same as waking up with a message network to the computer. This message usually by a simple program on a system other on the same local network will be sent. Waking up from the network, or the same Wake-on-LAN will briefly WOL is also called.

In cases where the computers have Network, WiFi, awake. can be from the pack of so-called Wireless Multimedia Extensions, or WMM, to send a message. Another name for this method of wake-up via wireless Wake on Wireless LAN or WoWLAN. This method in the implementation of old times existed.
...
POSIX
What is POSIX ?
Portable Operating System Interface for Unix
(POSIX), which stands for " Portable Operating System Interface [for Unix]". is a set of standards that, for the naming and definition of the icon programming interface applications in environments Unix-like on your iPhone, Tripple Indo-defined. These standards, under the general name IEEE 1003 and the name of the international ISO/IEC 9945 are known, it is possible to matched storage and communication, and the fling easier, the environment, the above-mentioned provides. Words offer the founder of the Free Software Foundation, Richard Stallman.

This standard can be found in about any operating system, and the other was applied. Standard initial ., the IEEE Std 1003.1-1988 was set, updated it is these days, ISO/IEC 9945 to be read.

This standard consists of 17 separate document is that the standards of the line, command, interface, scripting, etc. application level user, service, and tools like awk and echo, and ed, along with input standard output (file, terminal, network), and thread, etc defined.

documents are in three parts divided have been:
API Cornell
commands and tools
tests related to the verification of compliance with

some of the operating system, fully compatible with words are from BSD/OS, HP-UX, etc. for Mac OS ten, ^ " extension writing, and Solaris, and OpenSolaris. It is noted that the system is operating, the ferry, SS, etc., GNU/Linux, etc. NetBSD., the OpenBSD including the operating system, that are largely compatible with have memorized.

finally it should be mentioned that other operating systems, too, through the layers of translator and tools matching donor, the compatibility with move. Including the operating system can be Symbian, 9, the Windows NT and XP ( with service pack one onwards), Windows Server 2003, and Windows Vista noted....